Image credit: Pete Markham Licensed under: CC BY 2.0

It’s tough for me to write the last blog post of the year. Maybe even tougher for you to concentrate on it, since most of us are focused on anything but work and IT right now.

But before you settle completely into holiday-think, devote a few cycles of your remaining work-think to some of the trends in endpoint management and network security that will probably be waiting for you when you get back.

6 Questions We Heard from You in 2015

In conversations with customers like you throughout the year, including at our Dell World User Forum, we’ve discussed with you the nuts and bolts of keeping hundreds of endpoints secure. After a few minutes on deploying patches, fixing vulnerabilities and enforcing security policies, you usually let us know what you would like to work on if only you could come up for air. We heard six prominent questions from you about the world of endpoint management outside your day-to-day, operational tasks:

  1. “How can I simultaneously innovate and maintain my infrastructure?” For two decades we’ve been talking about an 80-20 split between maintenance and innovation, yet it’s still an unattainable goal for many IT managers.
  2. “What’s with all the silos?” Not looking at the bigger IT picture and how all the pieces work together results in siloed IT organizations and focus. Nobody wins that way.
  3. “Am I the only IT Manager who doesn’t get to say ‘no’ anymore?” One customer told me it was not an option in her organization to tell users “no” when it comes to adding new devices and applications. Nevertheless, she has to support them. I told her she was not alone, but it was cold comfort.
  4. “How do I reduce threats and risks, yet still provide usability and flexibility?” If that were easy, they wouldn’t need us to do it. No sooner do you get all of those poles in the same tent than the ground underneath shifts with new threats and device types.
  5. “How are other organizations managing the consumerization of IT?” This new, user-centric world requires that we implement best practices and policies for BYOD, yet many organizations still have no formal plans in place.
  6. “What does good application experience look like?” You’re spending more time controlling and managing applications, including shadow implementations of those applications and new cloud deployments.

Stocking Stuffer: “Technology Tunnel Vision” E-book

We always enjoy hearing what our customers are seeing out there. You make us smarter and keep us on our toes.

It’s not quite the same as a holiday bonus, but we have a new e-book for you, Technology Tunnel Vision, Part 1, with more of the perspectives on endpoint management and network security that you’ll need in the new year.

Thanks for following us in 2015. We look forward to hearing more from you in 2016.

Anonymous
Related Content